Sciweavers

4511 search results - page 33 / 903
» Observation Based System Security
Sort
View
ASWEC
2004
IEEE
15 years 5 months ago
A Process Framework for Characterising Security Properties of Component-Based Software Systems
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Khaled M. Khan, Jun Han
ISN
1998
Springer
15 years 5 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
165
Voted
ICETE
2004
253views Business» more  ICETE 2004»
15 years 3 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
ECIR
2008
Springer
15 years 3 months ago
Using Clicks as Implicit Judgments: Expectations Versus Observations
Abstract. Clickthrough data has been the subject of increasing popularity as an implicit indicator of user feedback. Previous analysis has suggested that user click behaviour is su...
Falk Scholer, Milad Shokouhi, Bodo Billerbeck, And...
142
Voted
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 7 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...